+

US12316613B2 - Process and system for selectable data transmission - Google Patents

Process and system for selectable data transmission Download PDF

Info

Publication number
US12316613B2
US12316613B2 US18/485,881 US202318485881A US12316613B2 US 12316613 B2 US12316613 B2 US 12316613B2 US 202318485881 A US202318485881 A US 202318485881A US 12316613 B2 US12316613 B2 US 12316613B2
Authority
US
United States
Prior art keywords
data
video communication
user
communications terminal
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US18/485,881
Other versions
US20240048535A1 (en
Inventor
Marc Danzeisen
Jan Linder
Simon Winiker
Florian Baumgartner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
InterDigital CE Patent Holdings SAS
Original Assignee
InterDigital CE Patent Holdings SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by InterDigital CE Patent Holdings SAS filed Critical InterDigital CE Patent Holdings SAS
Priority to US18/485,881 priority Critical patent/US12316613B2/en
Assigned to INTERDIGITAL CE PATENT HOLDINGS, SAS reassignment INTERDIGITAL CE PATENT HOLDINGS, SAS ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SWISSCOM AG
Assigned to SWISSCOM AG reassignment SWISSCOM AG ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SWISSCOM (SCHWEITZ) AG, SWISSCOM FIXNET AG, SWISSCOM MOBILE AG
Assigned to SWISSCOM MOBILE AG reassignment SWISSCOM MOBILE AG ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BAUMGARTNER, FLORIAN, DANZEISEN, MARC, LINDER, JAN, WINIKER, SIMON
Publication of US20240048535A1 publication Critical patent/US20240048535A1/en
Application granted granted Critical
Publication of US12316613B2 publication Critical patent/US12316613B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Definitions

  • the present invention relates to a process and a system for selectable data transmission.
  • a network server In the state of the art, data that are present on a network, e.g. data stored on a network server, are often accessed from a terminal, e.g. from a computer of a user. Thus, a user can, for example, use a terminal in order to retrieve E-mail messages that are stored on an E-mail server.
  • various processes are known for the transmission of data between a server and a terminal. Processes are known that are particularly suitable for transmitting E-mail messages or current headlines. Processes are known for transmitting multimedia data, such as audio data or video data, from a network server to a terminal. Such processes can be based, for example, on protocols such as POP (Post Office protocol), IMAP (Internet Message Access Protocol), FTP (File Transfer Protocol), SMB (Server Message Block) or any other kind of protocol.
  • POP Post Office protocol
  • IMAP Internet Message Access Protocol
  • FTP File Transfer Protocol
  • SMB Server Message Block
  • a check can be made on whether a user is entitled to access the corresponding data.
  • the identity of a user is checked, by means of a user name and a password, for example, or, in other words, authentication is carried out.
  • authentication can also be based, for example, on the creation of a secured data connection, such as a VPN connection (VPN: Virtual Private Network).
  • VPN Virtual Private Network
  • Special software may be required, for example, in order to access the data.
  • the terminal may be necessary for the terminal to possess specific features, such as a particularly powerful processor, a particularly high-resolution screen, particular input devices, such as a precise mouse or a joystick, or any other kind of input/output devices, in order to display or represent the data on the terminal.
  • a user often possesses various terminals, e.g. a terminal at home, a mobile terminal, or a terminal at the workplace, whereby these terminals often also display different features in regard to network bandwidth, processor performance or screen resolution.
  • the transmission of data from a server to a terminal of a user suffers from various disadvantages.
  • a user could, of course, initially download data to a terminal on which the user is working at the time, and then retransmit the data to a preferred terminal.
  • Such a transmission is complicated, however, and is not feasible at all under some circumstances, for example, because of a lack of capacity of the network interface of the terminal, such as, for example, the capacity of the network interface of a mobile terminal.
  • the data transmitted to the preferred terminal could easily be looked at by a third party who was using that terminal at the time.
  • the document WO 2005/020541 discloses a method for the secure transfer of content from a content server to a content consumer.
  • a content requestor sends instructions so that a content access code is transmitted to the content consumer.
  • a request is sent by the content server for the encryption of content and for the downloading of the encrypted content to the content server.
  • the document WO 01/11883 discloses a method for the safe circulation of content.
  • a content provider provides content to a service provider.
  • the service provider provides the content to at least one content consumer.
  • a confidence-based relationship can exist between the content provider and the service provider, as well as between the service provider and at least one content consumer, so that the content is protected both during transmission and during reception within a broadcast or multicast network.
  • the present inventions include a new process and a new system for selectable data transmission which overcome the disadvantages of the prior art.
  • authentication data and an electronic key are generated, whereby the electronic key is stored as assigned to the authentication data, that data are encrypted by means of an encryption module of a central module and by means of at least part of the electronic key, that by means of a transmission module of the central module a signaling message is transmitted to a first communications terminal, that by means of the first communications terminal a second communications terminal is selected, whereby an identification of the selected second communications terminal is transmitted to the transmission module of the central module, that the encrypted data are transmitted by the transmission module of the central module to the second communications terminal based on the identification of the selected second communications terminal, that on the basis of a transmission of authentication data between the first and/or the second and/or a third communications terminal and an authentication module of the central module, at least part of the electronic key is transmitted to the second communications terminal, and that by means of a decryption module of the second communications terminal and by means of at least part of the electronic key, the encrypted data are decrypted.
  • Such a process has the particular advantage that a selectable data transmission can be carried out, whereby a user can select the communications terminal to which data are to be transmitted, and whereby it is ensured that only authorized persons can access the transmitted data.
  • a selectable data transmission can also refer, for example, to a transmission of a video stream or to a video call, so that, for example, the user on the first communications terminal receives the notification that data concerning a video stream is ready, that the user by means of the first communications terminal selects a second communications terminal, that the encrypted video stream is forwarded to the second communications terminal, that by means of the first or second communications terminal authentication is carried out, and that the electronic key for decrypting the video stream is transmitted to the second communications terminal.
  • the electronic key is generated based on the identification of the second communications terminal transmitted to the transmission module of the central module, and/or an encryption algorithm of the encryption module is selected based on the identification transmitted to the transmission module of the central module.
  • the encryption module can have a number of different encryption algorithms at its disposal. Depending on the electronic key generated, an encryption algorithm suitable for this key can be used. Or, depending on the identification of the second communications terminal, an encryption algorithm particularly well adapted to this communications terminal can be selected. So a different electronic key can be used, depending on the second communications terminal. If, for example, the second communications terminal is a computer in a firm, an electronic key can be used that provides a high degree of security. Or if, for example, the second communications terminal is a mobile computer, an electronic key can be used that enables efficient decryption. Such a process has the particular advantage that the encrypted data can be adapted to the second communications terminal.
  • At least part of the electronic key is transmitted over a communications link between the central module and the first communications terminal and over a communications link between the first communications terminal and the second communications terminal.
  • This embodiment is sensible, for example, if the first communications terminal is a mobile radio terminal that can be logged in and authenticated on a mobile radio network. So the electronic key can be transmitted to the mobile radio terminal of the user, for example, after the user has selected a second communications terminal with the mobile radio terminal and after the data have been encrypted. The encrypted data can then be transmitted to the second communications terminal.
  • the electronic key can be transmitted from the mobile radio terminal to the second communications terminal, for example, over a wireless communications link between the mobile radio device and the second communications terminal.
  • Such a process has the particular advantage that the electronic key for decrypting the encrypted data always remains under the control of the user and is easily available to the user.
  • a user profile is stored in the central module, whereby data are encrypted in accordance with the user profile. So it can be stored in the user profile that, for example, the latest order information for a product or the latest E-mail messages for the user are encrypted, whereby a corresponding signaling message is then transmitted to a first communications terminal of the user.
  • Such a process has the particular advantage that the encryption and transmission of data can be automated in accordance with the guidelines of the user.
  • the encrypted data can be transmitted to a network device of a network infrastructure, whereby the encrypted data are stored on the network device, and are transmitted asynchronously by the network device to the second communications terminal.
  • the network device can refer, for example, to a network storage device of a private ADSL connection of a residence, connected to an ADSL modem.
  • the ADSL modem and the network storage device remain permanently switched on and the encrypted data can thus be transmitted to the network storage device over the ADSL connection at any time.
  • the encrypted data stored on the network storage device can be transmitted to the computer of the user.
  • a public location such as a railway station with a WLAN access point that has at its disposal an air interface with a bandwidth of many Mbit/s, but is connected to a network infrastructure over a data line with only few Mbit/s
  • large quantities of encrypted data can be transmitted to the WLAN access point at night and temporarily stored, for example.
  • encrypted data can be transmitted over the powerful air interface to a mobile computer of the user.
  • Such a process has the particular advantage that the capacity utilization of network infrastructures can be optimized. So the transmission of encrypted data over an ADSL connection can take place in the afternoon, for example, at a time when as yet only few private users are using the network infrastructure of an Internet provider.
  • a local network in a residence normally has a much higher bandwidth than an ADSL connection.
  • the transmission from the network memory to the computer of the user takes a correspondingly much shorter time than a transmission over an ADSL connection.
  • a WLAN access point Similar advantages result.
  • a user account is debited with a monetary value upon the transfer of at least part of the electronic key.
  • chargeable services such as the provision of audio or video files, or any other file, or any other service, such as the intermediate storage of data, the administration of data, or any other service, can be offered to the user by means of the transmission of encrypted data.
  • the encrypted data include a program code that must be executed in order to decrypt the encrypted data, while validation criteria are checked during the execution of the program code.
  • the program code can, for example, be of such form that the validity of the key is checked with reference to a time measurement, to a central server with which the validity of keys is monitored, or in accordance with any other process.
  • Such a process has the particular advantage that, for example, a time can be defined after which the encrypted data are no longer available.
  • DRM Digital Rights Management
  • an identification is assigned to the data and/or to the encrypted data, and the authentication data are stored as assigned to the identification.
  • an identification can, for example, be formed as the result of a hash function of the encrypted data.
  • Such a process has the particular advantage that authentication for access to the encrypted data can also be of different forms with reference to the encrypted data.
  • FIG. 1 shows a block diagram with the individual components for the encryption of data and for selectable transfer of the encrypted data.
  • FIG. 2 shows a block diagram of the individual components for the authentication and decryption of the encrypted data.
  • FIG. 3 shows a block diagram as in FIG. 1 , whereby a key Sis transmitted to a second communications terminal mPh.
  • FIG. 4 shows a block diagram as in FIG. 2 , whereby the key Sis transmitted by the second communications terminal mPh to a first communications terminal oC.
  • the reference mark 10 refers to a central module.
  • the central module 10 can, for example, be formed as a software module of a network server.
  • the central module 10 can also, of course, be formed completely as a hardware module with appropriate electronic circuits.
  • the reference mark D refers to electronic data.
  • the data D can be electronic data of any kind, for example E-mail messages, texts, animations, audio files, video files, or electronic data of any other kind.
  • the reference mark A refers to authentication data and the reference mark S refers to an electronic key.
  • the authentication data A can, for example, include a user name and a password or pass phrase.
  • the electronic key S can, for example, include a symmetrical electronic key with a secret key or an asymmetrical electronic key with a public key and a private key.
  • the authentication data A are stored as assigned to the electronic key S while, for example, the central module 10 includes a corresponding table.
  • the authentication data A and the electronic key S can moreover be stored as assigned to an identification iD of the data, so that the authentication data A and the electronic key S are valid only with reference to data that can be identified by the identification iD of the data.
  • Corresponding tables can of course also be provided for in the central module 10 with reference to the identification iD of the data.
  • Data D can be encrypted by means of the electronic key S and an encryption module of the central module 10 .
  • Such encryption can refer to any encryption algorithm, for example a DES algorithm (DES: Data Encryption Standard), a PGP algorithm (PGP: Pretty Good Privacy), an IDEA algorithm (IDEA: International Data Encryption Algorithm), or any other encryption algorithm.
  • Encrypted data vD are generated by the encryption of the data D.
  • the reference mark mPh relates to a first communications terminal.
  • the first communications terminal can be a mobile radio telephone, a mobile computer, or any other communications terminal.
  • the reference mark sM relates to a signaling message.
  • the signaling message can be a message in accordance with the SMS standard (SMS: Short Message Service), the USSD standard (USSD: Unstructured Supplementary Service Data), the SS7 standard (SS7: signaling system #7), the SIP standard (SIP: Session Initiation Protocol) or any other standard or any other format.
  • SMS Short Message Service
  • USSD USSD: Unstructured Supplementary Service Data
  • SS7 SS7: signaling system #7
  • SIP Session Initiation Protocol
  • the availability of data D or of encrypted data vD is signaled to the first communications terminal mPh with the signaling message sM.
  • the signaling message sM can be transmitted to the first communications terminal mPh over any communications network, for example, over a mobile radio network, over a wireless mobile radio network, over a wire-based data network such as an Ethernet network, or over any other communications network.
  • the signaling message sM can include information relating to the availability of E-mail messages, audio data, video data, or any other kind of data. Such information can concern, for example, the title, the sender, the author, the subject line, or any other kind of information for the identification of data D or for the identification of encrypted data vD.
  • the signaling message sM can be interpreted on the first communications device mPh, and corresponding information about the availability of data or of encrypted data can be notified to the user on a display of the first communications terminal. Information relating to second communications terminals hC,mC,oC can be notified on the display at the same time. Information relating to second communications terminals hC,mC,oC can be transmitted to the first communications terminal mPh together with the signaling message sM, or this information can have been stored in advance on the first communications terminal mPh.
  • a second communications terminal hC,mC,oC can, for example, be a computer, such as a notebook or a PDA (PDA: Personal Digital Assistant), a mobile telephone, a games console, a permanently installed computer, or any other communications terminal.
  • the designation hC relates, for example, to a computer of the user at home
  • the designation mC relates, for example, to a mobile computer of the user
  • the designation oC designates, for example, a computer in an office at a workplace of the user.
  • the user can select one of the second communications terminals hC,mC,oC, the second communications terminal oC, for example, by means of an input device of the first communications terminal, a keyboard, a mouse, a joystick, for example, or any other input device.
  • An appropriate message oCM can be transmitted to the central module 10 by means of a transmission module of the first communications terminal mPh.
  • Such a message can be interpreted by a transmission module of the central module 10 , and the encrypted data vD can then be transmitted to the corresponding second communications terminal oC by means of the transmission module of the central module 10 .
  • printers, beamers, or devices of any other kind which for example are not in the possession of the user and are used by the user only temporarily, during a presentation, for example, can also be used as a second communications terminal.
  • a presentation can be transmitted as encrypted data vD to a computer that is assigned to a beamer.
  • the presentation can be decrypted and presented with the beamer by a corresponding transmission of the key S.
  • Such a process guarantees that all the data are available at the start of the presentation, and that the data are only accessible to the authorized user, in particular without the user having to take with him a mobile computer of his own.
  • Such a transmission of a presentation to a computer assigned to a beamer is of interest, in particular, for very large quantities of data, such as a video file.
  • the reference mark 40 refers to a communications network.
  • the communications network can, for example, refer to the Internet and can be constructed from various networks of differing technologies.
  • the communications network can include GSM networks, UMTS networks, WLAN networks, Ethernet networks, UWB networks, or networks of any other kind.
  • the central module 10 and the second communications terminal hC,mC,oC can be connected in particular to the communications network 40 .
  • the transmission as described of encrypted data vD to a second communications terminal hC,mC,oC is enabled by means of the communications network 40 . There are the widest variety of options in order thus to store data D as encrypted data vD on the second communications terminal hC,mC,oC.
  • E-mail messages, texts, animations, audio files, video files or data of any other kind can be stored on the second communications terminal hC,mC,oC as encrypted E-mail messages, encrypted texts, encrypted animations, encrypted audio files, or encrypted video files. It is, however, the case that the encrypted data vD may still be useless, since for the time being the key to decrypt the encrypted data is stored only on the central module 10 .
  • the transmission of the signaling message sM to the first communications terminal mPh and/or the transmission of the encrypted data vD to the second communications terminal hC,mC,oC can take place at any favorable time.
  • a favorable time can refer to the arrival of new E-mail messages, the availability of texts, or the publication of a new audio file.
  • a favorable time can also refer to the availability of a communications link between the communications network 40 and the second communications terminal hC,mC,oC, the capacity utilization of the communications network 40 , the capacity utilization of parts of the communications network 40 , a time that occurs due to an input from the user on one of the communications terminals, or any other time.
  • the transmission of the encrypted data vD can also take place in accordance with various scenarios.
  • One scenario can be that the encrypted data vD are transmitted to the second communications terminal hC,mC,oC at any time during the night over a broadband communications link, such as an Ethernet connection.
  • a broadband communications link such as an Ethernet connection.
  • Such a scenario may be selected, for example, in order to transmit a very large encrypted video file, of an order of magnitude of 5 Gbytes, for example, to the second communications terminal hC,mC,oC.
  • encrypted data may be transmitted to the second communications terminal mC as soon as the user with this communications terminal mC comes into the range of a wireless communications network, such as a WLAN network or UWB network at a railway station or on the site of an airport.
  • Such a scenario may be selected, for example, in order to transmit encrypted E-mail messages or encrypted texts to a user's second communications terminal mC before he boards a train.
  • the channel between the second communications terminal and the wireless communications network has a much higher bandwidth than the channel between the wireless communications network and the backbone of the service provider.
  • the channel to the backbone can lead to a severe restriction on the reception rate.
  • encrypted texts may refer, for example, to the current electronic issue of a daily newspaper.
  • the second communications terminal hC,mC,oC can refer, for example, to a mobile computer with a customary VGA screen resolution of 1024 ⁇ 768 pixels.
  • the second communications terminal hC,mC,oC it makes no sense to provide a video file in much higher screen resolution, for example.
  • a transformation of the data D can be carried out so that the data D are already better adapted to the second communications terminal on which the data are to be presented.
  • Such a transformation of the data can only be carried out of course if corresponding information is available about the second communications terminal. Such information can, for example, be stored in a user profile.
  • authentication data A are transmitted from the second communications terminal hC,mC,oC to the central module I 0 .
  • the case using the second communications terminal oC is outlined in FIG. 2 .
  • Entitlement is thus authenticated with the electronic key S.
  • At least parts of the electronic key S are then transmitted by the central module IO to the second communications terminal hC,mC,oC.
  • the encrypted data vD stored on the communications terminal can be decrypted and stored as data Don the communications terminal, whereby that the user can access the data D.
  • An authentication of entitlement with the electronic key S can take place in accordance with known processes. Such processes can take place on the basis of a password or pass phrases, by means of a SecureID card (SecureID: authentication process of the firm RSA Security), on the basis of the acquisition of biometric characteristics, or on any other basis that provides proof of entitlement.
  • SecureID authentication process of the firm RSA Security
  • the electronic key S can be transmitted to the second communications terminal hC,mC,oC, as shown in FIG. 3 and FIG. 4 .
  • the key S used for this purpose can be transmitted to the first communications terminal mPh. This is particularly sensible if the first communications terminal mPh is a mobile radio terminal logged in on a mobile radio network and thus authenticated.
  • the electronic key S is available to the user of the mobile radio terminal.
  • the encrypted data are then transmitted to a second communications terminal hC,mC,oC in accordance with the selection made by the user.
  • the key S can be transmitted from the mobile radio terminal to the second communications terminal hC,mC,oC over a local wireless connection, for example, a Bluetooth connection, for example, or any other local connection between the mobile radio terminal and the second communications terminal hC,mC,oC, whereupon the encrypted data vD stored on the second communications terminal hC,mC,oC can be decrypted into data D, and whereupon the user can access the data D by means of the second communications terminal hC,mC,oC.
  • a local wireless connection for example, a Bluetooth connection, for example, or any other local connection between the mobile radio terminal and the second communications terminal hC,mC,oC
  • a local wireless connection for example, a Bluetooth connection, for example, or any other local connection between the mobile radio terminal and the second communications terminal hC,mC,oC
  • the encrypted data vD stored on the second communications terminal hC,mC,oC can be decrypted into data D, and whereupon the user can
  • the identification iD, the authentication data A, and the key S can be stored in a table with such tuples. Different tuples can also be used for different applications.
  • a first tuple may, for example, be used to encrypt video data, such as the latest hit films, for a particular second terminal device, such as a home computer of a user.
  • a second tuple can be used to encrypt the same video data for a mobile computer of the user.
  • the same identification iD and the same authentication data can admittedly be used.
  • the key S can be selected as adapted to the respective terminal device, so that a key with, for example, different security requirements can be used in each case for the home computer and for the mobile computer.
  • the user profiles mentioned can be of such form that they are respectively tracked dynamically by the first communications device mPh.
  • the user profiles are dynamically tracked in such a way that, if a signaling message sM refers to the same or similar data, the same or a similar second communications terminal hC,mC,oC is selected in each case for the transmission of encrypted data vD.
  • the previously described process may be encoded in software on a computer readable medium including a compact disk, memory device, flash memory or any other computer readable physical medium.
  • the software is configured to cause a processor-based device to carry out one or more of the steps described above.
  • Computer operations are described in “How Computers Work, Millennium Edition,” by Ron White, Que Publications, 1999, the entire contents of which being incorporated herein by reference.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Methods and systems are provided for use in selectable data transmission. In a portable mobile computing device, a request to initiate an instant video communication with a remote portable multi-function computing device may be received, and in response to receiving the request to initiate the instant video communication, it may be determined, based on a stored authorization list, that the instant video communication connection to the remote portable multi-function computing device is authorized, and In response to such determining, stored connection information for the remote portable multi-function computing device may be accessed, and captured video communication data for the requested instant video communication may be transmitted according to the stored instant connection information such that the captured video communication data may be displayed at the remote portable multi-function computing device as it is received.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
This application is a continuation of U.S. patent application Ser. No. 17/223,187, filed Apr. 6, 2021, which is a continuation of U.S. patent application Ser. No. 16/154,105, filed Oct. 8, 2018, issued on Apr. 6, 2021 as U.S. Pat. No. 10,972,440, which is a continuation of U.S. patent application Ser. No. 15/332,493, filed on Oct. 24, 2016, issued on Oct. 9, 2018 as U.S. Pat. No. 10,097,519, which is a continuation of U.S. patent Ser. No. 13/928,640, filed Jun. 27, 2013, issued on Oct. 25, 2016 as U.S. Pat. No. 9,479,486, which is a continuation of Ser. No. 11/774,621, filed Jul. 9, 2007, issued on Jul. 9, 2013 as U.S. Pat. No. 8,484,468, which is claims priority to European Patent Application, No. 06116806.8, filed Jul. 7, 2006, in the European Patent Office, the entire contents of which are incorporated by reference herein.
BACKGROUND OF THE INVENTION FIELD OF THE INVENTION
The present invention relates to a process and a system for selectable data transmission.
DESCRIPTION OF THE RELATED ART
In the state of the art, data that are present on a network, e.g. data stored on a network server, are often accessed from a terminal, e.g. from a computer of a user. Thus, a user can, for example, use a terminal in order to retrieve E-mail messages that are stored on an E-mail server. In the state of the art, various processes are known for the transmission of data between a server and a terminal. Processes are known that are particularly suitable for transmitting E-mail messages or current headlines. Processes are known for transmitting multimedia data, such as audio data or video data, from a network server to a terminal. Such processes can be based, for example, on protocols such as POP (Post Office protocol), IMAP (Internet Message Access Protocol), FTP (File Transfer Protocol), SMB (Server Message Block) or any other kind of protocol.
Before data are transmitted, a check can be made on whether a user is entitled to access the corresponding data. Before E-mail messages are accessed, or before an audio file is downloaded, for example, the identity of a user is checked, by means of a user name and a password, for example, or, in other words, authentication is carried out. Such authentication can also be based, for example, on the creation of a secured data connection, such as a VPN connection (VPN: Virtual Private Network). After the check on the identity of the user, corresponding data are transmitted to the terminal of the user, whereupon the data are available to the user on this terminal.
Depending on the nature of the data, however, and depending on the nature of the terminal, it can be problematic for the user to access the data. Special software may be required, for example, in order to access the data. Or it may be necessary for the terminal to possess specific features, such as a particularly powerful processor, a particularly high-resolution screen, particular input devices, such as a precise mouse or a joystick, or any other kind of input/output devices, in order to display or represent the data on the terminal. A user often possesses various terminals, e.g. a terminal at home, a mobile terminal, or a terminal at the workplace, whereby these terminals often also display different features in regard to network bandwidth, processor performance or screen resolution. After the user has carried out authentication with a terminal and is thus entitled to transmit specific data to the terminal, such as E-mail messages or video data, it would often be convenient for the user to select a particular terminal in order to transmit the data to that terminal. Thus, it can be convenient that an E-mail message with a video file is better transmitted to the terminal at home or that an E-mail message with a presentation is better transmitted to the terminal at the workplace. In order to carry out such a transmission of the data in the state of the art, the user must carry out authentication with the appropriate terminal and then initiate the transmission of the data to the terminal. In the state of the art, data are downloaded by the user to the same terminal on which the representation of the data also takes place.
In the state of the art, for the reasons mentioned, the transmission of data from a server to a terminal of a user, for example, suffers from various disadvantages. A user could, of course, initially download data to a terminal on which the user is working at the time, and then retransmit the data to a preferred terminal. Such a transmission is complicated, however, and is not feasible at all under some circumstances, for example, because of a lack of capacity of the network interface of the terminal, such as, for example, the capacity of the network interface of a mobile terminal. Without additional authentication mechanisms, moreover, the data transmitted to the preferred terminal could easily be looked at by a third party who was using that terminal at the time.
The document WO 2005/020541 discloses a method for the secure transfer of content from a content server to a content consumer. A content requestor sends instructions so that a content access code is transmitted to the content consumer. On the basis of the content access code, a request is sent by the content server for the encryption of content and for the downloading of the encrypted content to the content server.
The document WO 01/11883 discloses a method for the safe circulation of content. A content provider provides content to a service provider. The service provider provides the content to at least one content consumer. A confidence-based relationship can exist between the content provider and the service provider, as well as between the service provider and at least one content consumer, so that the content is protected both during transmission and during reception within a broadcast or multicast network.
SUMMARY OF THE INVENTION
The present inventions include a new process and a new system for selectable data transmission which overcome the disadvantages of the prior art.
According to the present inventions, these objectives are achieved in particular by the elements of the independent claims. In addition, further advantageous embodiments emerge from the dependent claims and the description.
These objectives are achieved by the present inventions in particular by the fact that authentication data and an electronic key are generated, whereby the electronic key is stored as assigned to the authentication data, that data are encrypted by means of an encryption module of a central module and by means of at least part of the electronic key, that by means of a transmission module of the central module a signaling message is transmitted to a first communications terminal, that by means of the first communications terminal a second communications terminal is selected, whereby an identification of the selected second communications terminal is transmitted to the transmission module of the central module, that the encrypted data are transmitted by the transmission module of the central module to the second communications terminal based on the identification of the selected second communications terminal, that on the basis of a transmission of authentication data between the first and/or the second and/or a third communications terminal and an authentication module of the central module, at least part of the electronic key is transmitted to the second communications terminal, and that by means of a decryption module of the second communications terminal and by means of at least part of the electronic key, the encrypted data are decrypted. Such a process has the particular advantage that a selectable data transmission can be carried out, whereby a user can select the communications terminal to which data are to be transmitted, and whereby it is ensured that only authorized persons can access the transmitted data. Such a selectable data transmission can also refer, for example, to a transmission of a video stream or to a video call, so that, for example, the user on the first communications terminal receives the notification that data concerning a video stream is ready, that the user by means of the first communications terminal selects a second communications terminal, that the encrypted video stream is forwarded to the second communications terminal, that by means of the first or second communications terminal authentication is carried out, and that the electronic key for decrypting the video stream is transmitted to the second communications terminal.
In one embodiment of the present invention, the electronic key is generated based on the identification of the second communications terminal transmitted to the transmission module of the central module, and/or an encryption algorithm of the encryption module is selected based on the identification transmitted to the transmission module of the central module. The encryption module can have a number of different encryption algorithms at its disposal. Depending on the electronic key generated, an encryption algorithm suitable for this key can be used. Or, depending on the identification of the second communications terminal, an encryption algorithm particularly well adapted to this communications terminal can be selected. So a different electronic key can be used, depending on the second communications terminal. If, for example, the second communications terminal is a computer in a firm, an electronic key can be used that provides a high degree of security. Or if, for example, the second communications terminal is a mobile computer, an electronic key can be used that enables efficient decryption. Such a process has the particular advantage that the encrypted data can be adapted to the second communications terminal.
In another embodiment of the present invention, at least part of the electronic key is transmitted over a communications link between the central module and the first communications terminal and over a communications link between the first communications terminal and the second communications terminal. This embodiment is sensible, for example, if the first communications terminal is a mobile radio terminal that can be logged in and authenticated on a mobile radio network. So the electronic key can be transmitted to the mobile radio terminal of the user, for example, after the user has selected a second communications terminal with the mobile radio terminal and after the data have been encrypted. The encrypted data can then be transmitted to the second communications terminal. As soon as the user wishes to access the encrypted data with the second communications terminal, the electronic key can be transmitted from the mobile radio terminal to the second communications terminal, for example, over a wireless communications link between the mobile radio device and the second communications terminal. Such a process has the particular advantage that the electronic key for decrypting the encrypted data always remains under the control of the user and is easily available to the user.
In one embodiment of the present invention, a user profile is stored in the central module, whereby data are encrypted in accordance with the user profile. So it can be stored in the user profile that, for example, the latest order information for a product or the latest E-mail messages for the user are encrypted, whereby a corresponding signaling message is then transmitted to a first communications terminal of the user. Such a process has the particular advantage that the encryption and transmission of data can be automated in accordance with the guidelines of the user.
In another embodiment of the present invention, the availability of the second communications terminal is checked by means of an availability module of the central module and, if the second communications terminal is available, the encrypted data are transmitted to the second communications terminal. In this context, availability can mean that a network interface of the second communications terminal is ready to receive. Availability can however also mean that, as a consequence of overloading of the capacity of the corresponding networks, the communications link between the transmission module and the second communications terminal is classified as not available. Such a process has the particular advantage that the encrypted data can be transmitted to the second communications terminal at the earliest possible time or when the utilization of network capacity is at a definable level.
In another embodiment of the present invention, the encrypted data can be transmitted to a network device of a network infrastructure, whereby the encrypted data are stored on the network device, and are transmitted asynchronously by the network device to the second communications terminal. Thus, the network device can refer, for example, to a network storage device of a private ADSL connection of a residence, connected to an ADSL modem. In this process, the ADSL modem and the network storage device remain permanently switched on and the encrypted data can thus be transmitted to the network storage device over the ADSL connection at any time. As soon as the user switches on his computer at home, the encrypted data stored on the network storage device can be transmitted to the computer of the user. Or at a public location, such as a railway station with a WLAN access point that has at its disposal an air interface with a bandwidth of many Mbit/s, but is connected to a network infrastructure over a data line with only few Mbit/s, large quantities of encrypted data can be transmitted to the WLAN access point at night and temporarily stored, for example. As soon as the user passes the WLAN access point at the railway station in the morning, encrypted data can be transmitted over the powerful air interface to a mobile computer of the user. Such a process has the particular advantage that the capacity utilization of network infrastructures can be optimized. So the transmission of encrypted data over an ADSL connection can take place in the afternoon, for example, at a time when as yet only few private users are using the network infrastructure of an Internet provider. A local network in a residence normally has a much higher bandwidth than an ADSL connection. The transmission from the network memory to the computer of the user takes a correspondingly much shorter time than a transmission over an ADSL connection. For the case described of a WLAN access point, similar advantages result.
In another embodiment of the present invention, a user account is debited with a monetary value upon the transfer of at least part of the electronic key. Such a process has the particular advantage that chargeable services, such as the provision of audio or video files, or any other file, or any other service, such as the intermediate storage of data, the administration of data, or any other service, can be offered to the user by means of the transmission of encrypted data.
In a further embodiment of the present invention, the encrypted data include a program code that must be executed in order to decrypt the encrypted data, while validation criteria are checked during the execution of the program code. The program code can, for example, be of such form that the validity of the key is checked with reference to a time measurement, to a central server with which the validity of keys is monitored, or in accordance with any other process. Such a process has the particular advantage that, for example, a time can be defined after which the encrypted data are no longer available. Such a process moreover guarantees compatibility with processes known from DRM (DRM: Digital Rights Management).
In another embodiment of the present invention, an identification is assigned to the data and/or to the encrypted data, and the authentication data are stored as assigned to the identification. Such an identification can, for example, be formed as the result of a hash function of the encrypted data. Such a process has the particular advantage that authentication for access to the encrypted data can also be of different forms with reference to the encrypted data.
BRIEF DESCRIPTION OF THE DRAWINGS
A more complete appreciation of the invention and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
FIG. 1 shows a block diagram with the individual components for the encryption of data and for selectable transfer of the encrypted data.
FIG. 2 shows a block diagram of the individual components for the authentication and decryption of the encrypted data.
FIG. 3 shows a block diagram as in FIG. 1 , whereby a key Sis transmitted to a second communications terminal mPh.
FIG. 4 shows a block diagram as in FIG. 2 , whereby the key Sis transmitted by the second communications terminal mPh to a first communications terminal oC.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views.
In FIG. 1 , the reference mark 10 refers to a central module. The central module 10 can, for example, be formed as a software module of a network server. The central module 10 can also, of course, be formed completely as a hardware module with appropriate electronic circuits. In FIG. 1 , the reference mark D refers to electronic data. The data D can be electronic data of any kind, for example E-mail messages, texts, animations, audio files, video files, or electronic data of any other kind. In FIG. 1 , the reference mark A refers to authentication data and the reference mark S refers to an electronic key. The authentication data A can, for example, include a user name and a password or pass phrase. The electronic key S can, for example, include a symmetrical electronic key with a secret key or an asymmetrical electronic key with a public key and a private key. The authentication data A are stored as assigned to the electronic key S while, for example, the central module 10 includes a corresponding table. The authentication data A and the electronic key S can moreover be stored as assigned to an identification iD of the data, so that the authentication data A and the electronic key S are valid only with reference to data that can be identified by the identification iD of the data. Corresponding tables can of course also be provided for in the central module 10 with reference to the identification iD of the data. Data D can be encrypted by means of the electronic key S and an encryption module of the central module 10. Such encryption can refer to any encryption algorithm, for example a DES algorithm (DES: Data Encryption Standard), a PGP algorithm (PGP: Pretty Good Privacy), an IDEA algorithm (IDEA: International Data Encryption Algorithm), or any other encryption algorithm. Encrypted data vD are generated by the encryption of the data D.
In FIG. 1 , the reference mark mPh relates to a first communications terminal. The first communications terminal can be a mobile radio telephone, a mobile computer, or any other communications terminal. In FIG. 1 , the reference mark sM relates to a signaling message. The signaling message can be a message in accordance with the SMS standard (SMS: Short Message Service), the USSD standard (USSD: Unstructured Supplementary Service Data), the SS7 standard (SS7: signaling system #7), the SIP standard (SIP: Session Initiation Protocol) or any other standard or any other format. The availability of data D or of encrypted data vD is signaled to the first communications terminal mPh with the signaling message sM. The signaling message sM can be transmitted to the first communications terminal mPh over any communications network, for example, over a mobile radio network, over a wireless mobile radio network, over a wire-based data network such as an Ethernet network, or over any other communications network. So the signaling message sM can include information relating to the availability of E-mail messages, audio data, video data, or any other kind of data. Such information can concern, for example, the title, the sender, the author, the subject line, or any other kind of information for the identification of data D or for the identification of encrypted data vD. The signaling message sM can be interpreted on the first communications device mPh, and corresponding information about the availability of data or of encrypted data can be notified to the user on a display of the first communications terminal. Information relating to second communications terminals hC,mC,oC can be notified on the display at the same time. Information relating to second communications terminals hC,mC,oC can be transmitted to the first communications terminal mPh together with the signaling message sM, or this information can have been stored in advance on the first communications terminal mPh. A second communications terminal hC,mC,oC can, for example, be a computer, such as a notebook or a PDA (PDA: Personal Digital Assistant), a mobile telephone, a games console, a permanently installed computer, or any other communications terminal. The designation hC relates, for example, to a computer of the user at home, the designation mC relates, for example, to a mobile computer of the user, and the designation oC designates, for example, a computer in an office at a workplace of the user. The user can select one of the second communications terminals hC,mC,oC, the second communications terminal oC, for example, by means of an input device of the first communications terminal, a keyboard, a mouse, a joystick, for example, or any other input device. An appropriate message oCM can be transmitted to the central module 10 by means of a transmission module of the first communications terminal mPh. Such a message can be interpreted by a transmission module of the central module 10, and the encrypted data vD can then be transmitted to the corresponding second communications terminal oC by means of the transmission module of the central module 10. However, printers, beamers, or devices of any other kind, which for example are not in the possession of the user and are used by the user only temporarily, during a presentation, for example, can also be used as a second communications terminal. Thus, by means of the appropriate selection by the first communications terminal mPh, a presentation can be transmitted as encrypted data vD to a computer that is assigned to a beamer. As soon as the user wishes to start the presentation, the presentation can be decrypted and presented with the beamer by a corresponding transmission of the key S. Such a process guarantees that all the data are available at the start of the presentation, and that the data are only accessible to the authorized user, in particular without the user having to take with him a mobile computer of his own. Such a transmission of a presentation to a computer assigned to a beamer is of interest, in particular, for very large quantities of data, such as a video file.
In FIG. 1 , the reference mark 40 refers to a communications network. The communications network can, for example, refer to the Internet and can be constructed from various networks of differing technologies. Thus, the communications network can include GSM networks, UMTS networks, WLAN networks, Ethernet networks, UWB networks, or networks of any other kind. As shown in FIG. 1 , the central module 10 and the second communications terminal hC,mC,oC can be connected in particular to the communications network 40. The transmission as described of encrypted data vD to a second communications terminal hC,mC,oC is enabled by means of the communications network 40. There are the widest variety of options in order thus to store data D as encrypted data vD on the second communications terminal hC,mC,oC. E-mail messages, texts, animations, audio files, video files or data of any other kind can be stored on the second communications terminal hC,mC,oC as encrypted E-mail messages, encrypted texts, encrypted animations, encrypted audio files, or encrypted video files. It is, however, the case that the encrypted data vD may still be useless, since for the time being the key to decrypt the encrypted data is stored only on the central module 10.
The transmission of the signaling message sM to the first communications terminal mPh and/or the transmission of the encrypted data vD to the second communications terminal hC,mC,oC can take place at any favorable time. A favorable time can refer to the arrival of new E-mail messages, the availability of texts, or the publication of a new audio file. A favorable time, however, can also refer to the availability of a communications link between the communications network 40 and the second communications terminal hC,mC,oC, the capacity utilization of the communications network 40, the capacity utilization of parts of the communications network 40, a time that occurs due to an input from the user on one of the communications terminals, or any other time.
The transmission of the encrypted data vD can also take place in accordance with various scenarios. One scenario can be that the encrypted data vD are transmitted to the second communications terminal hC,mC,oC at any time during the night over a broadband communications link, such as an Ethernet connection. Such a scenario may be selected, for example, in order to transmit a very large encrypted video file, of an order of magnitude of 5 Gbytes, for example, to the second communications terminal hC,mC,oC. Or, in another scenario, encrypted data may be transmitted to the second communications terminal mC as soon as the user with this communications terminal mC comes into the range of a wireless communications network, such as a WLAN network or UWB network at a railway station or on the site of an airport. Such a scenario may be selected, for example, in order to transmit encrypted E-mail messages or encrypted texts to a user's second communications terminal mC before he boards a train. Depending on the network infrastructure, the channel between the second communications terminal and the wireless communications network has a much higher bandwidth than the channel between the wireless communications network and the backbone of the service provider. Although data could admittedly be received at high speed by the second communications terminal, the channel to the backbone can lead to a severe restriction on the reception rate. For such a scenario, it is advantageous to transmit encrypted data from the backbone to an intermediate storage device arranged in the wireless communications network ahead of time, during the night, for example. As soon as the second communications terminal mC is brought into the range of the wireless communications network, in the morning, for example, large quantities of encrypted data can be transmitted to the second communications terminal in little time, over a UWB network in particular. It may be remarked here that encrypted texts may refer, for example, to the current electronic issue of a daily newspaper.
Depending on the application, the features that the second communications terminal hC,mC,oC has at its disposal are already known at the time of encryption. Thus, the second communications terminal can refer, for example, to a mobile computer with a customary VGA screen resolution of 1024×768 pixels. For such a second communications terminal hC,mC,oC, it makes no sense to provide a video file in much higher screen resolution, for example. Correspondingly, before the encryption of the data by means of the key S, a transformation of the data D can be carried out so that the data D are already better adapted to the second communications terminal on which the data are to be presented. Such a transformation of the data can only be carried out of course if corresponding information is available about the second communications terminal. Such information can, for example, be stored in a user profile.
In FIG. 2 , the reference marks introduced in FIG. 1 are retained. As shown in FIG. 2 , authentication data A are transmitted from the second communications terminal hC,mC,oC to the central module I 0. The case using the second communications terminal oC is outlined in FIG. 2 . Entitlement is thus authenticated with the electronic key S. At least parts of the electronic key S are then transmitted by the central module IO to the second communications terminal hC,mC,oC. By means of the electronic key S, the encrypted data vD stored on the communications terminal can be decrypted and stored as data Don the communications terminal, whereby that the user can access the data D.
An authentication of entitlement with the electronic key S can take place in accordance with known processes. Such processes can take place on the basis of a password or pass phrases, by means of a SecureID card (SecureID: authentication process of the firm RSA Security), on the basis of the acquisition of biometric characteristics, or on any other basis that provides proof of entitlement.
Alternatively, the electronic key S can be transmitted to the second communications terminal hC,mC,oC, as shown in FIG. 3 and FIG. 4 . As soon as the data Dis encrypted into encrypted data vD, the key S used for this purpose can be transmitted to the first communications terminal mPh. This is particularly sensible if the first communications terminal mPh is a mobile radio terminal logged in on a mobile radio network and thus authenticated. The electronic key S is available to the user of the mobile radio terminal. The encrypted data are then transmitted to a second communications terminal hC,mC,oC in accordance with the selection made by the user. As soon as the user uses the corresponding second communications terminal, the key S can be transmitted from the mobile radio terminal to the second communications terminal hC,mC,oC over a local wireless connection, for example, a Bluetooth connection, for example, or any other local connection between the mobile radio terminal and the second communications terminal hC,mC,oC, whereupon the encrypted data vD stored on the second communications terminal hC,mC,oC can be decrypted into data D, and whereupon the user can access the data D by means of the second communications terminal hC,mC,oC.
As indicated in FIGS. 1 to 4 by the dotted fields, the identification iD, the authentication data A, and the key S can be stored in a table with such tuples. Different tuples can also be used for different applications. Thus, a first tuple may, for example, be used to encrypt video data, such as the latest hit films, for a particular second terminal device, such as a home computer of a user. Or a second tuple can be used to encrypt the same video data for a mobile computer of the user. Thus, the same identification iD and the same authentication data can admittedly be used. On the other hand, the key S can be selected as adapted to the respective terminal device, so that a key with, for example, different security requirements can be used in each case for the home computer and for the mobile computer.
The user profiles mentioned can be of such form that they are respectively tracked dynamically by the first communications device mPh. Thus, when a second communications terminal hC,mC,oC is selected, the user profiles are dynamically tracked in such a way that, if a signaling message sM refers to the same or similar data, the same or a similar second communications terminal hC,mC,oC is selected in each case for the transmission of encrypted data vD. By means of such a user profile, it can in particular be defined for specific data D which preparation of the data D should take place, which key S should be used, and to which second communications terminal hC,mC,oC the encrypted data vD should be transmitted, for example, in the absence of an appropriate identification by the first communications terminal mPh.
The previously described process may be encoded in software on a computer readable medium including a compact disk, memory device, flash memory or any other computer readable physical medium. The software is configured to cause a processor-based device to carry out one or more of the steps described above. Computer operations are described in “How Computers Work, Millennium Edition,” by Ron White, Que Publications, 1999, the entire contents of which being incorporated herein by reference.
Obviously, numerous modifications and variations of the present inventions are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the inventions may be practiced otherwise than as specifically described herein.

Claims (10)

What is claimed is:
1. A system comprising:
a storage device configured to maintain a user account associated with a user, wherein: the user account comprises a list of authorized devices of the user,
the authorized devices of the user are authorized for video communication, and
other devices of the user are not authorized for video communication; and
one or more processors operable to:
receive a request to initiate video communication with a particular device;
in response to receipt of the request to initiate the video communication, determine that the particular device is authorized based on the list of authorized devices in the user account; and
in response to the determination that the particular device is authorized based on the list of authorized devices in the user account, transmit video communication data for the requested video communication according to the user account, wherein the video communication data is configured to be displayed at the particular device as it is received.
2. The system of claim 1, wherein the video communication data is transmitted to the particular device when the particular device comes into a range of a wireless communications network.
3. The system of claim 1, wherein the determination that the particular device is authorized is further based on authentication data received from a further device.
4. The system of claim 3, wherein the authentication data received from the further device is received over a first network that is different than a second network used to transmit the video communication data.
5. The system of claim 1, wherein the one or more processors are further operable to adapt the video communication data to the particular device before the transmission.
6. A method, comprising:
maintaining a user account associated with a user in a storage device, wherein the user account comprises a list of authorized devices of the user, and wherein the authorized devices of the user are authorized for video communication, and wherein other devices of the user are not authorized for video communication;
receiving, via one or more processors, a request to initiate video communication with a particular device;
determining, via the one or more processors, that the particular device is authorized based on the list of authorized devices in the user account; and
transmitting, via the one or more processors, video communication data for the requested video communication according to the user account, wherein the video communication data is configured to be displayed at the particular device as it is received.
7. The method of claim 6, further comprising transmitting the video communication data to the particular device when the particular device comes into a range of a wireless communications network.
8. The method of claim 6, wherein determining that the particular device is authorized is further based on authentication data received from a further device.
9. The method of claim 8, further comprising receiving the authentication data from the further device over a first network that is different than a second network used to transmit the video communication data.
10. The method of claim 6, further comprising, before the transmitting, adapting the video communication data to the particular device.
US18/485,881 2006-07-07 2023-10-12 Process and system for selectable data transmission Active US12316613B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/485,881 US12316613B2 (en) 2006-07-07 2023-10-12 Process and system for selectable data transmission

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
EP06116806 2006-07-07
EP06116806.8 2006-07-07
EP06116806A EP1876549A1 (en) 2006-07-07 2006-07-07 Method and system for encrypted data transmission
US11/774,621 US8484468B2 (en) 2006-07-07 2007-07-09 Process and system for selectable data transmission
US13/928,640 US9479486B2 (en) 2006-07-07 2013-06-27 Process and system for selectable data transmission
US15/332,493 US10097519B2 (en) 2006-07-07 2016-10-24 Process and system for selectable data transmission
US16/154,105 US10972440B2 (en) 2006-07-07 2018-10-08 Process and system for selectable data transmission
US17/223,187 US20210226931A1 (en) 2006-07-07 2021-04-06 Process and system for selectable data transmission
US18/485,881 US12316613B2 (en) 2006-07-07 2023-10-12 Process and system for selectable data transmission

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/223,187 Continuation US20210226931A1 (en) 2006-07-07 2021-04-06 Process and system for selectable data transmission

Publications (2)

Publication Number Publication Date
US20240048535A1 US20240048535A1 (en) 2024-02-08
US12316613B2 true US12316613B2 (en) 2025-05-27

Family

ID=37513752

Family Applications (6)

Application Number Title Priority Date Filing Date
US11/774,621 Active 2030-04-20 US8484468B2 (en) 2006-07-07 2007-07-09 Process and system for selectable data transmission
US13/928,640 Active 2027-11-26 US9479486B2 (en) 2006-07-07 2013-06-27 Process and system for selectable data transmission
US15/332,493 Active US10097519B2 (en) 2006-07-07 2016-10-24 Process and system for selectable data transmission
US16/154,105 Active US10972440B2 (en) 2006-07-07 2018-10-08 Process and system for selectable data transmission
US17/223,187 Abandoned US20210226931A1 (en) 2006-07-07 2021-04-06 Process and system for selectable data transmission
US18/485,881 Active US12316613B2 (en) 2006-07-07 2023-10-12 Process and system for selectable data transmission

Family Applications Before (5)

Application Number Title Priority Date Filing Date
US11/774,621 Active 2030-04-20 US8484468B2 (en) 2006-07-07 2007-07-09 Process and system for selectable data transmission
US13/928,640 Active 2027-11-26 US9479486B2 (en) 2006-07-07 2013-06-27 Process and system for selectable data transmission
US15/332,493 Active US10097519B2 (en) 2006-07-07 2016-10-24 Process and system for selectable data transmission
US16/154,105 Active US10972440B2 (en) 2006-07-07 2018-10-08 Process and system for selectable data transmission
US17/223,187 Abandoned US20210226931A1 (en) 2006-07-07 2021-04-06 Process and system for selectable data transmission

Country Status (2)

Country Link
US (6) US8484468B2 (en)
EP (1) EP1876549A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1876550B1 (en) 2006-07-07 2013-08-14 Swisscom AG Method and system for encrypted data transmission
EP1876549A1 (en) * 2006-07-07 2008-01-09 Swisscom Mobile AG Method and system for encrypted data transmission
US9516269B2 (en) * 2014-06-04 2016-12-06 Apple Inc. Instant video communication connections
US11539686B2 (en) * 2017-10-12 2022-12-27 Mx Technologies, Inc. Data aggregation management based on credentials
CN111159693B (en) * 2019-12-28 2022-11-29 西安精雕软件科技有限公司 Electronic equipment permission verification method, device and system and readable medium
CN111163102B (en) * 2019-12-31 2022-02-25 奇安信科技集团股份有限公司 Data processing method and device, network equipment and readable storage medium
CN113515387B (en) * 2021-09-13 2022-03-15 渔翁信息技术股份有限公司 Data processing method and device and electronic device

Citations (133)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5027271A (en) 1987-12-21 1991-06-25 Bull Hn Information Systems Inc. Apparatus and method for alterable resource partitioning enforcement in a data processing system having central processing units using different operating systems
US5999622A (en) 1995-11-22 1999-12-07 Microsoft Corporation Method and apparatus for protecting widely distributed digital information
US6081278A (en) 1998-06-11 2000-06-27 Chen; Shenchang Eric Animation object having multiple resolution format
US6157941A (en) 1998-03-18 2000-12-05 Oracle Corporation Architecture for client-server communication over a communication link
US6157723A (en) 1997-03-03 2000-12-05 Motorola, Inc. Method and apparatus for secure communications with encryption key scheduling
WO2001011883A1 (en) 1999-08-10 2001-02-15 Intel Corporation System and method for securely distributing content to groups of receivers
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US20020002674A1 (en) 2000-06-29 2002-01-03 Tom Grimes Digital rights management
US20020013772A1 (en) 1999-03-27 2002-01-31 Microsoft Corporation Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like
WO2002013455A1 (en) 2000-08-04 2002-02-14 First Data Corporation Person-centric account-based digital signature system
US20020018580A1 (en) 2000-06-20 2002-02-14 Mitsuru Maeda Data processing apparatus and method, and computer-readable storage medium on which program for executing data processing is stored
US20020023028A1 (en) 2000-01-14 2002-02-21 Quarendon Brian L. Retailing audio files in a fuel dispensing environment
US6353448B1 (en) 2000-05-16 2002-03-05 Ez Online Network, Inc. Graphic user interface display method
US20020059629A1 (en) 2000-08-21 2002-05-16 Markel Steven O. Detection and recognition of data receiver to facilitate proper transmission of enhanced data
US20020085719A1 (en) 2000-07-24 2002-07-04 Bluesocket, Inc. Method and system for enabling centralized control of wireless local area networks
US20020091848A1 (en) 2000-09-06 2002-07-11 Robert Agresta System, device and method for remotely providing, accessing and using personal entertainment media
US20020097415A1 (en) 2001-01-19 2002-07-25 Chang William Ho Methods for universal data output
US20020107802A1 (en) * 2000-12-06 2002-08-08 Ashwin Philips Secure file downloading
US20020133595A1 (en) 2000-01-11 2002-09-19 Shinya Kimura Network system transmitting data to mobile terminal, server used in the system, and method for transmitting data to mobile terminal used by the server
US6467090B1 (en) 1998-07-15 2002-10-15 Qwest Communications International Inc. Method and system for provisioning a single physical broadband drop to accommodate multiple devices
US20030035544A1 (en) * 2001-08-15 2003-02-20 Samsung Electronics Co., Ltd. Apparatus and method for secure distribution of mobile station location information
US20030076808A1 (en) 1998-09-17 2003-04-24 Mcniff Peter Gerald System and method for mobile computing device registration with a service node
US20030104806A1 (en) 2001-12-05 2003-06-05 Wireless Peripherals, Inc. Wireless telepresence collaboration system
US20030108205A1 (en) 2001-12-07 2003-06-12 Bryan Joyner System and method for providing encrypted data to a device
US6665722B1 (en) 2000-05-31 2003-12-16 Bbnt Solutions Llc Store-and-forward packet radio system and method
EP1372055A2 (en) 2002-06-12 2003-12-17 Microsoft Corporation Publishing content in connection with digital rights management (DRM) architecture
US20040022391A1 (en) 2002-07-30 2004-02-05 O'brien Royal Digital content security system and method
US20040110494A1 (en) 2002-12-09 2004-06-10 Voice Signal Technologies, Inc. Provider-activated software for mobile communication devices
US20040120526A1 (en) 2002-12-24 2004-06-24 Max Hamberg Method for communication control in a communication network, communication control entity, key management entity, terminal and gateway entity
US20040128508A1 (en) 2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity
US20040156500A1 (en) 1999-08-29 2004-08-12 Faber Robert W. Method and apparatus for generating pseudo random numbers in a video device having an embedded cipher unit
US20040176974A1 (en) 2000-05-18 2004-09-09 Whitmaps (Israel) Ltd. Method and system for presenting on-line "Yellow Pages", particularly in association with location data
US20040224678A1 (en) 2003-05-08 2004-11-11 Starent Networks, Corp. Reduced latency in half-duplex wireless communications
EP1480100A1 (en) 2003-05-22 2004-11-24 Copyright Clearance Center, Inc. Method and apparatus for secure delivery and rights management of digital content
US20040236672A1 (en) 2001-11-02 2004-11-25 Jung Eun Su Method of conducting an emu payment process using irfm
US20040239982A1 (en) 2001-08-31 2004-12-02 Gignac John-Paul J Method of cropping a digital image
US20040261093A1 (en) 2003-02-24 2004-12-23 Rebaud Sylvain P. Media service delivery system providing conditional access to media content from various client devices
US20050021539A1 (en) 2003-03-07 2005-01-27 Chaticom, Inc. Methods and systems for digital rights management of protected content
WO2005020541A1 (en) 2003-08-13 2005-03-03 Thomson Licensing Method and device for securing content delivery over a communication network via content keys
US20050060405A1 (en) 2002-09-16 2005-03-17 Guy Nathan Digital downloading jukebox system with central and local music servers
US20050096870A1 (en) 2003-10-31 2005-05-05 Hewlett-Packard Development Company, L.P. Method of providing content to a target device in a network
US20050114686A1 (en) 2003-11-21 2005-05-26 International Business Machines Corporation System and method for multiple users to securely access encrypted data on computer system
US20050138371A1 (en) 2003-12-19 2005-06-23 Pss Systems, Inc. Method and system for distribution of notifications in file security systems
US6925182B1 (en) 1997-12-19 2005-08-02 Koninklijke Philips Electronics N.V. Administration and utilization of private keys in a networked environment
US20050188196A1 (en) 2004-01-09 2005-08-25 Hiroshi Kakii Method of nullifying digital certificate, apparatus for nullifying digital certificate, and system, program, and recoring medium for nullifying digital certificate
EP1571804A2 (en) 2004-03-05 2005-09-07 Kabushiki Kaisha Toshiba Method and apparatus for secure contents transfer and copyright protection
US6981156B1 (en) 1999-05-03 2005-12-27 Everbee Network Method, server system and device for making safe a communication network
US20060010199A1 (en) * 2004-02-04 2006-01-12 Brailean James C Method and system for providing information to remote clients
US20060008256A1 (en) 2003-10-01 2006-01-12 Khedouri Robert K Audio visual player apparatus and system and method of content distribution using the same
US20060070107A1 (en) * 2004-09-24 2006-03-30 Martin Renkis Wireless video surveillance system and method with remote viewing
US20060107061A1 (en) 2004-11-12 2006-05-18 Jayson Holovacs Means and method for providing secure access to KVM switch and other server management systems
US20060105748A1 (en) 2004-04-26 2006-05-18 Ooi Chin Shyan R Portable storage device with encryption system
US20060126582A1 (en) 2004-12-09 2006-06-15 Nokia Corporation Delivering data to a mobile node in idle mode
US20060126812A1 (en) 2004-12-09 2006-06-15 International Business Machines Corporation Method and system for sharing one or more graphics images between devices using profiles
US20060137015A1 (en) 2004-12-18 2006-06-22 Comcast Cable Holdings, Llc System and method for secure conditional access download and reconfiguration
US7068640B2 (en) 2000-07-26 2006-06-27 Fujitsu Limited VPN system in mobile IP network, and method of setting VPN
US20060179489A1 (en) 2001-06-22 2006-08-10 Joan-Maria Mas Ribes Conditional access system for digital data by key decryption and re-encryption
US20060178149A1 (en) 2005-02-04 2006-08-10 Kamat Sandip D Systems and methods for wireless cellular telephone routers
US20060204003A1 (en) 2005-02-28 2006-09-14 Osamu Takata Cryptographic communication system and method
US7120667B2 (en) 2001-10-30 2006-10-10 Hewlett-Packard Development Company, L.P. Method and system for ad hoc networking of computer users
US20070028120A1 (en) 2004-11-12 2007-02-01 Apple Computer, Inc. Secure software updates
US20070027812A1 (en) 2005-07-29 2007-02-01 Sony Corporation Content distribution system and content distribution method
US7203752B2 (en) 2001-02-16 2007-04-10 Openwave Systems Inc. Method and system for managing location information for wireless communications devices
US20070087766A1 (en) 2005-10-14 2007-04-19 Hardy Michael T Method, device, software and graphical user interface for forwarding messages between message handling services
US20070086750A1 (en) 2005-10-14 2007-04-19 Jovial Technologies Wireless car digital audio/video system and its method
US20070091166A1 (en) * 2002-07-29 2007-04-26 Gerd Mossakowski Method for video monitoring objects by means of a mobile communications systems.
US20070136371A1 (en) 2005-12-12 2007-06-14 Mci, Inc. Profile-based user access to a network management system
US7245908B1 (en) 2003-06-19 2007-07-17 Sprint Spectrum L.P. Method and entity for processing communications based on altitude
US20070171374A1 (en) 2006-01-13 2007-07-26 Moore Leslie G Method and system for delivering digital cinema content concurrently to both a retail exhibitor and remote theater
US20070177740A1 (en) 2004-10-08 2007-08-02 Keiichi Nakajima Encryption key distribution system, key distribution server, locking terminal, viewing terminal, encryption key distribution method, and computer-readable medium
US20070195158A1 (en) 2006-02-23 2007-08-23 Kies Jonathan K Apparatus and methods for managing video calls on a wireless device
US20070203838A1 (en) 2005-04-13 2007-08-30 Samsung Electronics Co., Ltd. Encryption/decryption method and apparatus for controlling content use based on license information
US20070237093A1 (en) * 2006-03-31 2007-10-11 Bala Rajagopalan Methods and apparatus for providing an access profile system associated with a broadband wireless access network
US20070244822A1 (en) 2006-04-14 2007-10-18 Hogan Josh N Portable link drive
US7308477B1 (en) 2001-01-10 2007-12-11 Cisco Technology, Inc. Unified messaging system configured for transport of encrypted messages
US20070286133A1 (en) 2006-06-07 2007-12-13 Tony Kirke Handheld communication device for communication of information
US20070286113A1 (en) 2006-06-07 2007-12-13 Tony Kirke Method and system for communication of information by a handheld communication device in an ad-hoc network
WO2007148212A2 (en) 2006-06-22 2007-12-27 Nokia Corporation Enforcing geographic constraints in content distribution
US20080010216A1 (en) 2006-07-07 2008-01-10 Swisscom Mobile Ag Process and system for data transmission
US20080019519A1 (en) 2006-06-15 2008-01-24 Kabushiki Kaisha Toshiba System and method for secure facsimile transmission
US20080052513A1 (en) 2006-07-07 2008-02-28 Swisscom Mobile Ag Process and system for selectable data transmission
US20080095080A1 (en) 2006-10-17 2008-04-24 Swisscom Mobile Ag Method and system for transmission of data packets
US20080098226A1 (en) 2006-10-19 2008-04-24 Fujitsu Limited Encryption communication system, apparatus, method, and program
US20080148358A1 (en) * 2006-10-31 2008-06-19 Michael Denny Methods, systems, and computer program products for managing media content by capturing media content at a client device and storing the media content at a network accessible media repository
US20080205647A1 (en) 2005-09-22 2008-08-28 Shanghai Yee Networks Co., Ltd Information Subscribing System for Portable Terminal Device Having Autonomous Network Access
CN101303717A (en) 1995-02-13 2008-11-12 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US20090009605A1 (en) 2000-06-27 2009-01-08 Ortiz Luis M Providing multiple video perspectives of activities through a data network to a remote multimedia server for selective display by remote viewing audiences
US7490249B1 (en) 2002-05-09 2009-02-10 Zotus, Inc. Content protection and authentication without secret keys
US20090055904A1 (en) 2006-02-17 2009-02-26 Hidehito Gomi Distributed Authentication System and Distributed Authentication Method
US7587766B2 (en) 2004-11-18 2009-09-08 Starz Entertainment Group Llc Flexible digital content licensing
US20090227272A1 (en) 2005-01-14 2009-09-10 Swissorn Ag Method and system for transmitting data in mobile network nodes
US20100063905A1 (en) 2006-11-28 2010-03-11 Nilutesa, S.L. Method and system for performing banking transactions by simulating a virtual atm by means of a mobile telecommunications device
US7706777B2 (en) 2003-09-23 2010-04-27 Broadcom Corporation Secure user interface in a shared resource environment
US7792522B1 (en) 2006-01-13 2010-09-07 Positive Access Corporation Software key control for mobile devices
US20100298047A1 (en) 2005-09-22 2010-11-25 At&T Intellectual Property I, L.P. Video games on demand with anti-piracy security
US20100332615A1 (en) 1998-12-08 2010-12-30 Nomadix, Inc. Systems and methods for providing content and services on a network system
US20110059777A1 (en) 1999-06-04 2011-03-10 Ip Holdings, Inc. Reconfigurable mobile device interfaces supporting authenticated high quality video, audio, tv and multimedia services
US20110109715A1 (en) 2009-11-06 2011-05-12 Xiangpeng Jing Automated wireless three-dimensional (3D) video conferencing via a tunerless television device
US20110154031A1 (en) 2009-12-21 2011-06-23 International Business Machines Corporation Secure Kerberized Access of Encrypted File System
US8060746B2 (en) 2005-03-18 2011-11-15 Fujitsu Limited E-mail transfer method and device
US20110283333A1 (en) 2010-05-14 2011-11-17 Rovi Technologies Corporation Systems and methods for sending media content to a user device from a network of set-top cells
US8156344B2 (en) 2005-03-14 2012-04-10 Samsung Electronics Co., Ltd. Method and apparatus for backing up and restoring domain information
US8176155B2 (en) 2003-11-26 2012-05-08 Riip, Inc. Remote network management system
US8185605B2 (en) 2006-07-18 2012-05-22 Cisco Technology, Inc. Methods and apparatuses for accessing an application on a remote device
US20120210000A1 (en) 2011-02-15 2012-08-16 International Business Machines Corporation Registering Devices For Network Access
US8255804B2 (en) 2003-09-22 2012-08-28 Broadcom Corporation Resource controlled user interface resource management
US20120254614A1 (en) 2011-03-31 2012-10-04 Fujitsu Limited Non-transitory computer readable storage medium, information communication device and method
US20130070044A1 (en) 2002-08-29 2013-03-21 Surendra N. Naidoo Communication Systems
EP2605168A2 (en) * 2011-12-14 2013-06-19 Apple Inc. System and method for preventing the unauthorized playback of content
US8484268B2 (en) 2005-07-14 2013-07-09 Tara Chand Singhal Random wave envelope derived random numbers and their use in generating transient keys in communication security applications part II
US8538887B2 (en) 2000-11-01 2013-09-17 Sony Computer Entertainment Inc. Content delivery system and content delivery method
US8881261B1 (en) 2010-06-29 2014-11-04 F5 Networks, Inc. System and method for providing proactive VPN establishment
US20150021791A1 (en) 2013-07-16 2015-01-22 Amkor Technology, Inc. Semiconductor device
US20150046989A1 (en) 2013-08-08 2015-02-12 Duo Security, Inc. System and method for verifying status of an authentication device
US9124572B1 (en) * 2014-03-25 2015-09-01 Fmr Llc Secure video conferencing to conduct sensitive transactions
US20150271559A1 (en) 2000-03-02 2015-09-24 Tivo Inc. System And Method For Internet Access To A Personal Television Service
US20150271541A1 (en) * 2014-03-19 2015-09-24 Time Warner Cable Enterprises Llc Apparatus and methods for recording a media stream
US20160014457A1 (en) 2006-01-27 2016-01-14 Robin Dua System, method, and device to configure devices via a remote with biometrics
US20160156507A1 (en) 2000-01-31 2016-06-02 Telecommunication Systems, Inc. System and Method for Developing Applications in Wireless and Wireline Environments
US20160315989A1 (en) 2006-05-24 2016-10-27 Time Warner Cable Enterprises Llc Personal content server apparatus and methods
US9602775B2 (en) * 2009-05-07 2017-03-21 Centurylink Intellectual Property Llc Auto discovery and auto provisioning of set top boxes
CA3002977A1 (en) * 2015-11-04 2017-05-11 Screening Room Media, Inc. Digital content delivery system
US20180020075A1 (en) 2016-07-14 2018-01-18 Samsung Sds Co., Ltd. Apparatus and method for providing data based on cloud service
US9912676B1 (en) 2017-06-30 2018-03-06 Study Social, Inc. Account sharing prevention and detection in online education
US20180096169A1 (en) 2013-06-28 2018-04-05 Renesas Electronics Corporation Semiconductor integrated circuit and system
US20180199086A1 (en) * 2008-07-01 2018-07-12 Sling Media L.L.C. Systems and methods for systems and methods for securely streaming media content
US10206010B2 (en) 2000-03-02 2019-02-12 Tivo Solutions Inc. Method of sharing personal media using a digital recorder
WO2019177713A1 (en) * 2018-03-14 2019-09-19 Sony Interactive Entertainment LLC Secure decentralized video game transaction platform
US20200411397A1 (en) 2019-06-03 2020-12-31 Amkor Technology Singapore Holding Pte. Ltd. Semiconductor devices and related methods
US20210043606A1 (en) 2019-08-10 2021-02-11 Amkor Technology Inc. Semiconductor devices and methods of manufacturing semiconductor devices
US20210279297A1 (en) 2016-05-13 2021-09-09 Equals 3 LLC Linking to a search result
CA3085773C (en) * 2017-12-28 2022-08-30 Screening Room Media, Inc. Account verification system
US20220321658A1 (en) 2021-04-04 2022-10-06 Rissana, LLC System and method for handling the connection of user accounts to other entities

Patent Citations (140)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5027271A (en) 1987-12-21 1991-06-25 Bull Hn Information Systems Inc. Apparatus and method for alterable resource partitioning enforcement in a data processing system having central processing units using different operating systems
US20090043652A1 (en) 1995-02-13 2009-02-12 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
CN101303717A (en) 1995-02-13 2008-11-12 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US5999622A (en) 1995-11-22 1999-12-07 Microsoft Corporation Method and apparatus for protecting widely distributed digital information
US6157723A (en) 1997-03-03 2000-12-05 Motorola, Inc. Method and apparatus for secure communications with encryption key scheduling
US6925182B1 (en) 1997-12-19 2005-08-02 Koninklijke Philips Electronics N.V. Administration and utilization of private keys in a networked environment
US6157941A (en) 1998-03-18 2000-12-05 Oracle Corporation Architecture for client-server communication over a communication link
US6081278A (en) 1998-06-11 2000-06-27 Chen; Shenchang Eric Animation object having multiple resolution format
US6467090B1 (en) 1998-07-15 2002-10-15 Qwest Communications International Inc. Method and system for provisioning a single physical broadband drop to accommodate multiple devices
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6263313B1 (en) 1998-08-13 2001-07-17 International Business Machines Corporation Method and apparatus to create encoded digital content
US20030076808A1 (en) 1998-09-17 2003-04-24 Mcniff Peter Gerald System and method for mobile computing device registration with a service node
US20100332615A1 (en) 1998-12-08 2010-12-30 Nomadix, Inc. Systems and methods for providing content and services on a network system
US20020013772A1 (en) 1999-03-27 2002-01-31 Microsoft Corporation Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like
US6981156B1 (en) 1999-05-03 2005-12-27 Everbee Network Method, server system and device for making safe a communication network
US20110059777A1 (en) 1999-06-04 2011-03-10 Ip Holdings, Inc. Reconfigurable mobile device interfaces supporting authenticated high quality video, audio, tv and multimedia services
WO2001011883A1 (en) 1999-08-10 2001-02-15 Intel Corporation System and method for securely distributing content to groups of receivers
US20040156500A1 (en) 1999-08-29 2004-08-12 Faber Robert W. Method and apparatus for generating pseudo random numbers in a video device having an embedded cipher unit
US20020133595A1 (en) 2000-01-11 2002-09-19 Shinya Kimura Network system transmitting data to mobile terminal, server used in the system, and method for transmitting data to mobile terminal used by the server
US20020023028A1 (en) 2000-01-14 2002-02-21 Quarendon Brian L. Retailing audio files in a fuel dispensing environment
US20160156507A1 (en) 2000-01-31 2016-06-02 Telecommunication Systems, Inc. System and Method for Developing Applications in Wireless and Wireline Environments
US10206010B2 (en) 2000-03-02 2019-02-12 Tivo Solutions Inc. Method of sharing personal media using a digital recorder
US20150271559A1 (en) 2000-03-02 2015-09-24 Tivo Inc. System And Method For Internet Access To A Personal Television Service
US6353448B1 (en) 2000-05-16 2002-03-05 Ez Online Network, Inc. Graphic user interface display method
US20040176974A1 (en) 2000-05-18 2004-09-09 Whitmaps (Israel) Ltd. Method and system for presenting on-line "Yellow Pages", particularly in association with location data
US6665722B1 (en) 2000-05-31 2003-12-16 Bbnt Solutions Llc Store-and-forward packet radio system and method
US20020018580A1 (en) 2000-06-20 2002-02-14 Mitsuru Maeda Data processing apparatus and method, and computer-readable storage medium on which program for executing data processing is stored
US20090009605A1 (en) 2000-06-27 2009-01-08 Ortiz Luis M Providing multiple video perspectives of activities through a data network to a remote multimedia server for selective display by remote viewing audiences
US20020002674A1 (en) 2000-06-29 2002-01-03 Tom Grimes Digital rights management
US20020085719A1 (en) 2000-07-24 2002-07-04 Bluesocket, Inc. Method and system for enabling centralized control of wireless local area networks
US7068640B2 (en) 2000-07-26 2006-06-27 Fujitsu Limited VPN system in mobile IP network, and method of setting VPN
WO2002013455A1 (en) 2000-08-04 2002-02-14 First Data Corporation Person-centric account-based digital signature system
US20020059629A1 (en) 2000-08-21 2002-05-16 Markel Steven O. Detection and recognition of data receiver to facilitate proper transmission of enhanced data
US20020091848A1 (en) 2000-09-06 2002-07-11 Robert Agresta System, device and method for remotely providing, accessing and using personal entertainment media
US8538887B2 (en) 2000-11-01 2013-09-17 Sony Computer Entertainment Inc. Content delivery system and content delivery method
US20020107802A1 (en) * 2000-12-06 2002-08-08 Ashwin Philips Secure file downloading
US7308477B1 (en) 2001-01-10 2007-12-11 Cisco Technology, Inc. Unified messaging system configured for transport of encrypted messages
US20020097415A1 (en) 2001-01-19 2002-07-25 Chang William Ho Methods for universal data output
US7203752B2 (en) 2001-02-16 2007-04-10 Openwave Systems Inc. Method and system for managing location information for wireless communications devices
US20060179489A1 (en) 2001-06-22 2006-08-10 Joan-Maria Mas Ribes Conditional access system for digital data by key decryption and re-encryption
US20040128508A1 (en) 2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity
US20030035544A1 (en) * 2001-08-15 2003-02-20 Samsung Electronics Co., Ltd. Apparatus and method for secure distribution of mobile station location information
US20040239982A1 (en) 2001-08-31 2004-12-02 Gignac John-Paul J Method of cropping a digital image
US7120667B2 (en) 2001-10-30 2006-10-10 Hewlett-Packard Development Company, L.P. Method and system for ad hoc networking of computer users
US20040236672A1 (en) 2001-11-02 2004-11-25 Jung Eun Su Method of conducting an emu payment process using irfm
US20030104806A1 (en) 2001-12-05 2003-06-05 Wireless Peripherals, Inc. Wireless telepresence collaboration system
US20030108205A1 (en) 2001-12-07 2003-06-12 Bryan Joyner System and method for providing encrypted data to a device
US7490249B1 (en) 2002-05-09 2009-02-10 Zotus, Inc. Content protection and authentication without secret keys
EP1372055A2 (en) 2002-06-12 2003-12-17 Microsoft Corporation Publishing content in connection with digital rights management (DRM) architecture
US20070091166A1 (en) * 2002-07-29 2007-04-26 Gerd Mossakowski Method for video monitoring objects by means of a mobile communications systems.
US7787862B2 (en) 2002-07-29 2010-08-31 T-Mobile Deutschland Gmbh Method for video monitoring objects by means of a mobile communications systems
US20040022391A1 (en) 2002-07-30 2004-02-05 O'brien Royal Digital content security system and method
US20130070044A1 (en) 2002-08-29 2013-03-21 Surendra N. Naidoo Communication Systems
US20050060405A1 (en) 2002-09-16 2005-03-17 Guy Nathan Digital downloading jukebox system with central and local music servers
US20040110494A1 (en) 2002-12-09 2004-06-10 Voice Signal Technologies, Inc. Provider-activated software for mobile communication devices
US20040120526A1 (en) 2002-12-24 2004-06-24 Max Hamberg Method for communication control in a communication network, communication control entity, key management entity, terminal and gateway entity
US20040261093A1 (en) 2003-02-24 2004-12-23 Rebaud Sylvain P. Media service delivery system providing conditional access to media content from various client devices
US20050021539A1 (en) 2003-03-07 2005-01-27 Chaticom, Inc. Methods and systems for digital rights management of protected content
US20040224678A1 (en) 2003-05-08 2004-11-11 Starent Networks, Corp. Reduced latency in half-duplex wireless communications
EP1480100A1 (en) 2003-05-22 2004-11-24 Copyright Clearance Center, Inc. Method and apparatus for secure delivery and rights management of digital content
US7245908B1 (en) 2003-06-19 2007-07-17 Sprint Spectrum L.P. Method and entity for processing communications based on altitude
WO2005020541A1 (en) 2003-08-13 2005-03-03 Thomson Licensing Method and device for securing content delivery over a communication network via content keys
US8255804B2 (en) 2003-09-22 2012-08-28 Broadcom Corporation Resource controlled user interface resource management
US7706777B2 (en) 2003-09-23 2010-04-27 Broadcom Corporation Secure user interface in a shared resource environment
US20060008256A1 (en) 2003-10-01 2006-01-12 Khedouri Robert K Audio visual player apparatus and system and method of content distribution using the same
US20050096870A1 (en) 2003-10-31 2005-05-05 Hewlett-Packard Development Company, L.P. Method of providing content to a target device in a network
US20050114686A1 (en) 2003-11-21 2005-05-26 International Business Machines Corporation System and method for multiple users to securely access encrypted data on computer system
US8176155B2 (en) 2003-11-26 2012-05-08 Riip, Inc. Remote network management system
US20050138371A1 (en) 2003-12-19 2005-06-23 Pss Systems, Inc. Method and system for distribution of notifications in file security systems
US20050188196A1 (en) 2004-01-09 2005-08-25 Hiroshi Kakii Method of nullifying digital certificate, apparatus for nullifying digital certificate, and system, program, and recoring medium for nullifying digital certificate
US20060010199A1 (en) * 2004-02-04 2006-01-12 Brailean James C Method and system for providing information to remote clients
EP1571804A2 (en) 2004-03-05 2005-09-07 Kabushiki Kaisha Toshiba Method and apparatus for secure contents transfer and copyright protection
US20060105748A1 (en) 2004-04-26 2006-05-18 Ooi Chin Shyan R Portable storage device with encryption system
US20060070107A1 (en) * 2004-09-24 2006-03-30 Martin Renkis Wireless video surveillance system and method with remote viewing
US20070177740A1 (en) 2004-10-08 2007-08-02 Keiichi Nakajima Encryption key distribution system, key distribution server, locking terminal, viewing terminal, encryption key distribution method, and computer-readable medium
US20060107061A1 (en) 2004-11-12 2006-05-18 Jayson Holovacs Means and method for providing secure access to KVM switch and other server management systems
US20070028120A1 (en) 2004-11-12 2007-02-01 Apple Computer, Inc. Secure software updates
US7587766B2 (en) 2004-11-18 2009-09-08 Starz Entertainment Group Llc Flexible digital content licensing
US20060126582A1 (en) 2004-12-09 2006-06-15 Nokia Corporation Delivering data to a mobile node in idle mode
US20060126812A1 (en) 2004-12-09 2006-06-15 International Business Machines Corporation Method and system for sharing one or more graphics images between devices using profiles
US20060137015A1 (en) 2004-12-18 2006-06-22 Comcast Cable Holdings, Llc System and method for secure conditional access download and reconfiguration
US20090227272A1 (en) 2005-01-14 2009-09-10 Swissorn Ag Method and system for transmitting data in mobile network nodes
US20060178149A1 (en) 2005-02-04 2006-08-10 Kamat Sandip D Systems and methods for wireless cellular telephone routers
US20060204003A1 (en) 2005-02-28 2006-09-14 Osamu Takata Cryptographic communication system and method
US8156344B2 (en) 2005-03-14 2012-04-10 Samsung Electronics Co., Ltd. Method and apparatus for backing up and restoring domain information
US8060746B2 (en) 2005-03-18 2011-11-15 Fujitsu Limited E-mail transfer method and device
US20070203838A1 (en) 2005-04-13 2007-08-30 Samsung Electronics Co., Ltd. Encryption/decryption method and apparatus for controlling content use based on license information
US8484268B2 (en) 2005-07-14 2013-07-09 Tara Chand Singhal Random wave envelope derived random numbers and their use in generating transient keys in communication security applications part II
US20070027812A1 (en) 2005-07-29 2007-02-01 Sony Corporation Content distribution system and content distribution method
US20100298047A1 (en) 2005-09-22 2010-11-25 At&T Intellectual Property I, L.P. Video games on demand with anti-piracy security
US20080205647A1 (en) 2005-09-22 2008-08-28 Shanghai Yee Networks Co., Ltd Information Subscribing System for Portable Terminal Device Having Autonomous Network Access
US20070086750A1 (en) 2005-10-14 2007-04-19 Jovial Technologies Wireless car digital audio/video system and its method
US20070087766A1 (en) 2005-10-14 2007-04-19 Hardy Michael T Method, device, software and graphical user interface for forwarding messages between message handling services
US20070136371A1 (en) 2005-12-12 2007-06-14 Mci, Inc. Profile-based user access to a network management system
US20070171374A1 (en) 2006-01-13 2007-07-26 Moore Leslie G Method and system for delivering digital cinema content concurrently to both a retail exhibitor and remote theater
US7792522B1 (en) 2006-01-13 2010-09-07 Positive Access Corporation Software key control for mobile devices
US20160014457A1 (en) 2006-01-27 2016-01-14 Robin Dua System, method, and device to configure devices via a remote with biometrics
US20090055904A1 (en) 2006-02-17 2009-02-26 Hidehito Gomi Distributed Authentication System and Distributed Authentication Method
US20070195158A1 (en) 2006-02-23 2007-08-23 Kies Jonathan K Apparatus and methods for managing video calls on a wireless device
US20070237093A1 (en) * 2006-03-31 2007-10-11 Bala Rajagopalan Methods and apparatus for providing an access profile system associated with a broadband wireless access network
US20070244822A1 (en) 2006-04-14 2007-10-18 Hogan Josh N Portable link drive
US20160315989A1 (en) 2006-05-24 2016-10-27 Time Warner Cable Enterprises Llc Personal content server apparatus and methods
US20070286133A1 (en) 2006-06-07 2007-12-13 Tony Kirke Handheld communication device for communication of information
US20070286113A1 (en) 2006-06-07 2007-12-13 Tony Kirke Method and system for communication of information by a handheld communication device in an ad-hoc network
US20080019519A1 (en) 2006-06-15 2008-01-24 Kabushiki Kaisha Toshiba System and method for secure facsimile transmission
WO2007148212A2 (en) 2006-06-22 2007-12-27 Nokia Corporation Enforcing geographic constraints in content distribution
US20080052513A1 (en) 2006-07-07 2008-02-28 Swisscom Mobile Ag Process and system for selectable data transmission
US8484468B2 (en) 2006-07-07 2013-07-09 Swisscom Ag Process and system for selectable data transmission
US10972440B2 (en) * 2006-07-07 2021-04-06 Swisscom Ag Process and system for selectable data transmission
US9479486B2 (en) 2006-07-07 2016-10-25 Swisscom Ag Process and system for selectable data transmission
US20110251961A1 (en) 2006-07-07 2011-10-13 Swisscom Mobile Ag Process and system for data transmission
US20080010216A1 (en) 2006-07-07 2008-01-10 Swisscom Mobile Ag Process and system for data transmission
US8185605B2 (en) 2006-07-18 2012-05-22 Cisco Technology, Inc. Methods and apparatuses for accessing an application on a remote device
US20080095080A1 (en) 2006-10-17 2008-04-24 Swisscom Mobile Ag Method and system for transmission of data packets
US20080098226A1 (en) 2006-10-19 2008-04-24 Fujitsu Limited Encryption communication system, apparatus, method, and program
US20080148358A1 (en) * 2006-10-31 2008-06-19 Michael Denny Methods, systems, and computer program products for managing media content by capturing media content at a client device and storing the media content at a network accessible media repository
US20100063905A1 (en) 2006-11-28 2010-03-11 Nilutesa, S.L. Method and system for performing banking transactions by simulating a virtual atm by means of a mobile telecommunications device
US20180199086A1 (en) * 2008-07-01 2018-07-12 Sling Media L.L.C. Systems and methods for systems and methods for securely streaming media content
US9602775B2 (en) * 2009-05-07 2017-03-21 Centurylink Intellectual Property Llc Auto discovery and auto provisioning of set top boxes
US20110109715A1 (en) 2009-11-06 2011-05-12 Xiangpeng Jing Automated wireless three-dimensional (3D) video conferencing via a tunerless television device
US20110154031A1 (en) 2009-12-21 2011-06-23 International Business Machines Corporation Secure Kerberized Access of Encrypted File System
US20110283333A1 (en) 2010-05-14 2011-11-17 Rovi Technologies Corporation Systems and methods for sending media content to a user device from a network of set-top cells
US8881261B1 (en) 2010-06-29 2014-11-04 F5 Networks, Inc. System and method for providing proactive VPN establishment
US20120210000A1 (en) 2011-02-15 2012-08-16 International Business Machines Corporation Registering Devices For Network Access
US20120254614A1 (en) 2011-03-31 2012-10-04 Fujitsu Limited Non-transitory computer readable storage medium, information communication device and method
EP2605168A2 (en) * 2011-12-14 2013-06-19 Apple Inc. System and method for preventing the unauthorized playback of content
US20180096169A1 (en) 2013-06-28 2018-04-05 Renesas Electronics Corporation Semiconductor integrated circuit and system
US20150021791A1 (en) 2013-07-16 2015-01-22 Amkor Technology, Inc. Semiconductor device
US20150046989A1 (en) 2013-08-08 2015-02-12 Duo Security, Inc. System and method for verifying status of an authentication device
US20150271541A1 (en) * 2014-03-19 2015-09-24 Time Warner Cable Enterprises Llc Apparatus and methods for recording a media stream
US9124572B1 (en) * 2014-03-25 2015-09-01 Fmr Llc Secure video conferencing to conduct sensitive transactions
CA3002977A1 (en) * 2015-11-04 2017-05-11 Screening Room Media, Inc. Digital content delivery system
US20210279297A1 (en) 2016-05-13 2021-09-09 Equals 3 LLC Linking to a search result
US20180020075A1 (en) 2016-07-14 2018-01-18 Samsung Sds Co., Ltd. Apparatus and method for providing data based on cloud service
US9912676B1 (en) 2017-06-30 2018-03-06 Study Social, Inc. Account sharing prevention and detection in online education
CA3085773C (en) * 2017-12-28 2022-08-30 Screening Room Media, Inc. Account verification system
WO2019177713A1 (en) * 2018-03-14 2019-09-19 Sony Interactive Entertainment LLC Secure decentralized video game transaction platform
US20200411397A1 (en) 2019-06-03 2020-12-31 Amkor Technology Singapore Holding Pte. Ltd. Semiconductor devices and related methods
US20210043606A1 (en) 2019-08-10 2021-02-11 Amkor Technology Inc. Semiconductor devices and methods of manufacturing semiconductor devices
US20220321658A1 (en) 2021-04-04 2022-10-06 Rissana, LLC System and method for handling the connection of user accounts to other entities

Also Published As

Publication number Publication date
US20130290720A1 (en) 2013-10-31
US20170104729A1 (en) 2017-04-13
US10972440B2 (en) 2021-04-06
US8484468B2 (en) 2013-07-09
US20240048535A1 (en) 2024-02-08
US9479486B2 (en) 2016-10-25
US20080052513A1 (en) 2008-02-28
US20190281023A1 (en) 2019-09-12
US10097519B2 (en) 2018-10-09
US20210226931A1 (en) 2021-07-22
EP1876549A1 (en) 2008-01-09

Similar Documents

Publication Publication Date Title
US12316613B2 (en) Process and system for selectable data transmission
US10298708B2 (en) Targeted notification of content availability to a mobile device
US20070027921A1 (en) Context based action
US8156340B1 (en) System and method for securing system content by automated device authentication
US12126696B2 (en) Targeted notification of content availability to a mobile device
US20190050857A1 (en) Process and system for data transmission
GB2377143A (en) Internet security
JP2004078269A (en) Content supplying system

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载